They knew that America was well advanced technologically and that they digitalized almost all their activities. Tis strength was used as a leeway to this great nation. Tis led to one of America’s greatest thorn in the flesh- cyber terrorism. I refers to the use of the internet by terrorists e. snding mails to real criminal cases, wich result into virtual or physical loss (Council of Europe, 4. I may also be defined as vandalism, itimidation or coercing people to do things against their will or purchase products them, (idgoli, 21).
I this case, te attacks are not politically motivated but are an effort of certain individuals to instill fear and force others to do what they want. O else damage their reputation. Sme researchers argue that cyber terrorism is not real and that it is just one of America’s ways to seek sympathy or others even go ahead and say it’s a means used by this country to instill psychological torture and among its citizens. Ohers reveals that it is a means used to create job certain companies in America by creating a virus and spreading it then creating an anti-virus for the same to profits.
Tese claims have been disputed by scholars who claim that the attack have become one of those that no one knows who is likely to conduct the attack (faceless terrorism). Tey alos lack knowledge of when they will occur does not make the fact less real. Lch (15), psits how and why these cyber terrorist attack. Jst like the way terrorist inflict fear among people when they physically a through bombing they instill the same fear when they undertake cyber-attacks.
Istead of making people fear a particular place, wich they have bombed, cber terrorists inflict fear in the computer technologies. Scondly, te speculator factor is a vital element to consider. Tey always make sure their attacks are speculative in nature. Tis means that the targeted organization or institution should incur direct huge losses or suffer negative publicity. Fr instance, Aazon. cm website was shut down in 1999 due to Denial of Service (DOS) attack. Tis cost very huge but the worst part was the negative publicity the attack created.
Ten there is the vulnerability factor. I this case, te aim of the terrorist is to expose the vulnerability of the targeted organization. Tey achieve this by causing denial of service to the. ..
Please type your essay title, choose your document type, enter your email and we send you essay samples